首页 > 最新文献

2016 IEEE International Carnahan Conference on Security Technology (ICCST)最新文献

英文 中文
Architecture of instant messaging systems for secure data transmision 用于安全数据传输的即时消息系统的体系结构
Pub Date : 2016-10-01 DOI: 10.1109/CCST.2016.7815685
Jimmy Anderson Florez Zuluaga, R. C. Logreira, Mario Muñoz, J. Vargas-Bonilla
The use of online messaging systems to exchange information has changed due to the ability to share text, video and pictures almost immediately. Also it has become an excellent alternative for transmitting data with certain reserve levels in places or where voice signals and other forms of communication are not of high quality and/or availability, creating gaps in critical information security systems. This article describes the inherent risk of use messaging apphcations for transmission of classified information, based on user needs, but with a concept of organizational use. The analyzed elements are usability, privacy of contacts and content, data security, safe storage of information, traceability of messages, lifespan of the message, information storage encryption protocols and channel codification. Because of this, in this project, a survey has been conducted in regards to acceptable requirements applicable to these technologies in the work sector. This has led to the design of a set of applications from a usability standpoint while ensuring adequate and flexible security levels. Work completed in this research included aspects of design and architecture of a XMPP messaging system, privacy of information, use of local databases and storage of information according to relevant corporate security policies and agreements, biometric recognition systems for authentication encryption protocols.
由于能够几乎立即共享文本、视频和图片,使用在线消息系统交换信息已经发生了变化。此外,它已成为在某些地方或语音信号和其他形式的通信质量不高和/或可用性不高的地方传输具有一定储备水平的数据的绝佳替代方案,从而在关键的信息安全系统中造成空白。本文描述了基于用户需求使用消息传递应用程序传输分类信息的固有风险,但包含了组织使用的概念。分析的要素包括可用性、联系人和内容的隐私性、数据安全性、信息的安全存储、消息的可追溯性、消息的寿命、信息存储加密协议和通道编码。因此,在本项目中,对工作部门中适用于这些技术的可接受要求进行了调查。这导致从可用性的角度设计一组应用程序,同时确保充分和灵活的安全级别。本研究完成的工作包括XMPP消息传递系统的设计和架构、信息隐私、本地数据库的使用以及根据相关公司安全政策和协议存储信息、用于身份验证加密协议的生物识别系统等方面。
{"title":"Architecture of instant messaging systems for secure data transmision","authors":"Jimmy Anderson Florez Zuluaga, R. C. Logreira, Mario Muñoz, J. Vargas-Bonilla","doi":"10.1109/CCST.2016.7815685","DOIUrl":"https://doi.org/10.1109/CCST.2016.7815685","url":null,"abstract":"The use of online messaging systems to exchange information has changed due to the ability to share text, video and pictures almost immediately. Also it has become an excellent alternative for transmitting data with certain reserve levels in places or where voice signals and other forms of communication are not of high quality and/or availability, creating gaps in critical information security systems. This article describes the inherent risk of use messaging apphcations for transmission of classified information, based on user needs, but with a concept of organizational use. The analyzed elements are usability, privacy of contacts and content, data security, safe storage of information, traceability of messages, lifespan of the message, information storage encryption protocols and channel codification. Because of this, in this project, a survey has been conducted in regards to acceptable requirements applicable to these technologies in the work sector. This has led to the design of a set of applications from a usability standpoint while ensuring adequate and flexible security levels. Work completed in this research included aspects of design and architecture of a XMPP messaging system, privacy of information, use of local databases and storage of information according to relevant corporate security policies and agreements, biometric recognition systems for authentication encryption protocols.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"134 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80464194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
MTD assessment framework with cyber attack modeling 具有网络攻击建模的MTD评估框架
Pub Date : 2016-10-01 DOI: 10.1109/CCST.2016.7815722
B. V. Leeuwen, W. Stout, V. Urias
Moving Target Defense (MTD) has received significant focus in technical publications. The publications describe MTD approaches that periodically change some attribute of the computer network system. The attribute that is changed, in most cases, is one that an adversary attempts to gain knowledge of through reconnaissance and may use its knowledge of the attribute to exploit the system. The fundamental mechanism an MTD uses to secure the system is to change the system attributes such that the adversary never gains the knowledge and cannot execute an exploit prior to the attribute changing value. Thus, the MTD keeps the adversary from gaining the knowledge of attributes necessary to exploit the system. Most papers conduct theoretical analysis or basic simulations to assess the effectiveness of the MTD approach. More effective assessment of MTD approaches should include behavioral characteristics for both the defensive actor and the adversary; however, limited research exists on running actual attacks against an implemented system with the objective of determining the security benefits and total cost of deploying the MTD approach. This paper explores empirical assessment through experimentation of MTD approaches. The cyber-kill chain is used to characterize the actions of the adversary and identify what classes of attacks were successfully thwarted by the MTD approach and what classes of attacks could not be thwarted In this research paper, we identify the experiment environments and where experiment fidelity should be focused to evaluate the effectiveness of MTD approaches. Additionally, experimentation environments that support contemporary technologies used in MTD approaches, such as software defined networking (SDN), are also identified and discussed.
移动目标防御(MTD)在技术出版物中受到了极大的关注。这些出版物描述了MTD方法周期性地改变计算机网络系统的某些属性。在大多数情况下,被更改的属性是攻击者试图通过侦察获得知识的属性,并可能利用其对该属性的了解来利用系统。MTD用于保护系统的基本机制是更改系统属性,这样攻击者永远不会获得知识,也无法在属性更改值之前执行漏洞利用。因此,MTD使攻击者无法获得利用系统所必需的属性知识。大多数论文通过理论分析或基本模拟来评估MTD方法的有效性。对MTD方法更有效的评估应该包括防御行为者和对手的行为特征;然而,针对已实现的系统运行实际攻击,以确定部署MTD方法的安全收益和总成本的研究有限。本文通过MTD方法的实验探讨了实证评估。网络杀伤链用于表征对手的行动,并确定哪些类别的攻击被MTD方法成功挫败,哪些类别的攻击无法被挫败。在本研究论文中,我们确定了实验环境,以及应该关注实验保真度的地方,以评估MTD方法的有效性。此外,还确定并讨论了支持MTD方法中使用的现代技术的实验环境,例如软件定义网络(SDN)。
{"title":"MTD assessment framework with cyber attack modeling","authors":"B. V. Leeuwen, W. Stout, V. Urias","doi":"10.1109/CCST.2016.7815722","DOIUrl":"https://doi.org/10.1109/CCST.2016.7815722","url":null,"abstract":"Moving Target Defense (MTD) has received significant focus in technical publications. The publications describe MTD approaches that periodically change some attribute of the computer network system. The attribute that is changed, in most cases, is one that an adversary attempts to gain knowledge of through reconnaissance and may use its knowledge of the attribute to exploit the system. The fundamental mechanism an MTD uses to secure the system is to change the system attributes such that the adversary never gains the knowledge and cannot execute an exploit prior to the attribute changing value. Thus, the MTD keeps the adversary from gaining the knowledge of attributes necessary to exploit the system. Most papers conduct theoretical analysis or basic simulations to assess the effectiveness of the MTD approach. More effective assessment of MTD approaches should include behavioral characteristics for both the defensive actor and the adversary; however, limited research exists on running actual attacks against an implemented system with the objective of determining the security benefits and total cost of deploying the MTD approach. This paper explores empirical assessment through experimentation of MTD approaches. The cyber-kill chain is used to characterize the actions of the adversary and identify what classes of attacks were successfully thwarted by the MTD approach and what classes of attacks could not be thwarted In this research paper, we identify the experiment environments and where experiment fidelity should be focused to evaluate the effectiveness of MTD approaches. Additionally, experimentation environments that support contemporary technologies used in MTD approaches, such as software defined networking (SDN), are also identified and discussed.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"55 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89819756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Field trial results using a novel integration of unique millimeterwave Doppler radar for high performance non-obtrusive life sign (breathing and heart beating) monitoring of high suicide risk prisonner in observation cell 现场试验结果使用新颖集成的独特毫米波多普勒雷达对观察牢房中高自杀风险囚犯进行高性能非突发性生命体征(呼吸和心跳)监测
Pub Date : 2016-10-01 DOI: 10.1109/CCST.2016.7815682
A. Gagnon
This paper presents the fields results in non-obtrusive life sign monitoring performed using a low emission, compact high frequency Doppler radar, which can detect body movements associated with breathing and the heart beating. Such a system is particularly useful where attaching sensors to the body is undesirable; for example, monitoring detainees in a prison who are at risk of suicide, self-harm, and medical complications due to drugs or alcohol. This method of monitoring can aid greatly in situations where it can be difficult to ascertain a person's status, such as a person who is sleeping under a blanket. While a breathing and cardiac signal is visible in the Doppler radar signal, it can be corrupted by noise and interference by so-called nuisance signals (e.g., movements associated with fans, water flowing from faucets and toilets, door micro-motion, light fixture ballast vibration and other body movements). This work is part of a three-year project that involves four organizations; CSC (end-user), KG Spectrum (radar-based perimeter intrusion detection systems), Carleton-University (bio-medical) and Ottawa-University (signal processing). The final goal is to develop a robust system for detection of attempted suicide events in prisons in time to allow for lifesaving interventions. This has been done in a novel way by installing one high range (75cm) spacial resolution, scanning antenna and high frequency (24.125GHz) radars in prison cells and by processing signals extracted from the radars in real-time. This unique radar architecture allows the usage of novel signal processing and pattern recognition algorithms to locate the subject and removing interference and reliably estimate breathing and heartbeat signals, even when the subject is non-stationary and then to produce an alarm when these signals cannot be observed or significant changes, in breathing pattern or heart rate pattern, representing abnormal behavior have been detected within the observation cell. This research project is performing time, frequency and pattern domain analysis on the radar data and explores signal processing approaches for the robust and accurate detection and estimation of the respiratory with heartbeat rate. Outcome of this research will be useful in mitigating the risks associated with detainees by providing a life sign monitoring approach that can help enable timely responses. Such a system can also find application in smart health homes for monitoring people at risk, such as the elderly or infants, as well as in psychological institution. In addition to presenting the results of filed trial, this paper covers the innovative engineering aspects of using high frequency, high range resolution and high sampling rate as a mean to geo-localize the source of movement within the prison cells, thereby increasing the efficiency of the signal processing eliminating the need to process on overall volume wise integrated Doppler signal. The use of geo-localization provide
本文介绍了使用低发射,紧凑的高频多普勒雷达进行非突发性生命体征监测的领域结果,该雷达可以检测与呼吸和心脏跳动相关的身体运动。这种系统在不希望将传感器附加到身体上的情况下特别有用;例如,监测监狱中因吸毒或酗酒而有自杀、自残和并发症风险的被拘留者。这种监测方法可以在难以确定一个人的状态的情况下提供很大的帮助,例如一个人睡在毯子下。虽然呼吸和心脏信号在多普勒雷达信号中是可见的,但它可能会被噪音和所谓的干扰信号(例如,与风扇相关的运动、水龙头和厕所的水流、门的微运动、灯具镇流器的振动和其他身体运动)所破坏。这项工作是一个涉及四个组织的三年项目的一部分;CSC(终端用户),KG Spectrum(基于雷达的外围入侵检测系统),卡尔顿大学(生物医学)和渥太华大学(信号处理)。最终目标是建立一个强有力的系统,及时发现监狱中的自杀未遂事件,以便采取挽救生命的干预措施。通过在监狱牢房中安装一个高距离(75厘米)空间分辨率的扫描天线和高频(24.125GHz)雷达,并实时处理从雷达中提取的信号,以一种新颖的方式实现了这一目标。这种独特的雷达架构允许使用新颖的信号处理和模式识别算法来定位受试者,消除干扰,并可靠地估计呼吸和心跳信号,即使受试者是非静止的,然后当这些信号不能被观察到或在呼吸模式或心率模式中发生重大变化时产生警报,代表在观察单元内检测到异常行为。本研究项目对雷达数据进行时间、频率和模式域分析,探索信号处理方法,以鲁棒准确地检测和估计呼吸与心率。这项研究的结果将有助于减少与被拘留者有关的风险,因为它提供了一种生命迹象监测方法,有助于及时作出反应。这种系统还可以应用于智能健康之家,用于监测高危人群,如老年人或婴儿,以及心理机构。除了介绍现场试验的结果外,本文还涵盖了使用高频、高范围分辨率和高采样率作为对监狱牢房内运动源进行地理定位的手段的创新工程方面,从而提高了信号处理的效率,消除了对整体体积的集成多普勒信号进行处理的需要。地理定位的使用提供了对滋扰源的自然辨别,允许信号处理器专注于囚犯心跳和呼吸反应产生的多普勒信号。
{"title":"Field trial results using a novel integration of unique millimeterwave Doppler radar for high performance non-obtrusive life sign (breathing and heart beating) monitoring of high suicide risk prisonner in observation cell","authors":"A. Gagnon","doi":"10.1109/CCST.2016.7815682","DOIUrl":"https://doi.org/10.1109/CCST.2016.7815682","url":null,"abstract":"This paper presents the fields results in non-obtrusive life sign monitoring performed using a low emission, compact high frequency Doppler radar, which can detect body movements associated with breathing and the heart beating. Such a system is particularly useful where attaching sensors to the body is undesirable; for example, monitoring detainees in a prison who are at risk of suicide, self-harm, and medical complications due to drugs or alcohol. This method of monitoring can aid greatly in situations where it can be difficult to ascertain a person's status, such as a person who is sleeping under a blanket. While a breathing and cardiac signal is visible in the Doppler radar signal, it can be corrupted by noise and interference by so-called nuisance signals (e.g., movements associated with fans, water flowing from faucets and toilets, door micro-motion, light fixture ballast vibration and other body movements). This work is part of a three-year project that involves four organizations; CSC (end-user), KG Spectrum (radar-based perimeter intrusion detection systems), Carleton-University (bio-medical) and Ottawa-University (signal processing). The final goal is to develop a robust system for detection of attempted suicide events in prisons in time to allow for lifesaving interventions. This has been done in a novel way by installing one high range (75cm) spacial resolution, scanning antenna and high frequency (24.125GHz) radars in prison cells and by processing signals extracted from the radars in real-time. This unique radar architecture allows the usage of novel signal processing and pattern recognition algorithms to locate the subject and removing interference and reliably estimate breathing and heartbeat signals, even when the subject is non-stationary and then to produce an alarm when these signals cannot be observed or significant changes, in breathing pattern or heart rate pattern, representing abnormal behavior have been detected within the observation cell. This research project is performing time, frequency and pattern domain analysis on the radar data and explores signal processing approaches for the robust and accurate detection and estimation of the respiratory with heartbeat rate. Outcome of this research will be useful in mitigating the risks associated with detainees by providing a life sign monitoring approach that can help enable timely responses. Such a system can also find application in smart health homes for monitoring people at risk, such as the elderly or infants, as well as in psychological institution. In addition to presenting the results of filed trial, this paper covers the innovative engineering aspects of using high frequency, high range resolution and high sampling rate as a mean to geo-localize the source of movement within the prison cells, thereby increasing the efficiency of the signal processing eliminating the need to process on overall volume wise integrated Doppler signal. The use of geo-localization provide","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"25 1","pages":"1-9"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75230766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Prom Problem: Fair and privacy-enhanced matchmaking with identity linked wishes 舞会问题:公平和隐私增强配对与身份相关的愿望
Pub Date : 2016-10-01 DOI: 10.1109/CCST.2016.7815691
Dwight Home, S. Nair
In this paper we present the Prom Problem (TPP) which exemplifies a special class of matchmaking challenges. We introduce the notion of identity linked wishes - wishes that involve specific identities and are valid if and only if all involved parties have that wish. A number of protocols over the years have highlighted the conflicting goals of anonymity and authentication in attempting to match users with common wishes. More recent works have built upon past attempts proposing solutions for private and privacy-enhanced matchmaking with additional security goals. Yet those protocols are insufficient in the context of TPP due primarily to the lack of fairness and inability to ensure security and privacy. We describe TPP in detail, compare with prior work, and propose a fair and privacy-enhanced matchmaking protocol supporting identity linked wishes with an untrusted matchmaker. In practical terms, our technology can prevent much of the potential damage from data breaches similar to the recent Ashley Madison hack which has allegedly resulted in blackmail, ruined careers, espionage, and even suicide. We give a pseudo-code example of our solution along with its security and preliminary performance evaluation.
在本文中,我们提出了舞会问题(TPP),它是一类特殊的配对挑战的例子。我们引入了身份关联愿望的概念,即涉及特定身份的愿望,当且仅当所有相关方都有这种愿望时才有效。多年来,许多协议都强调了匿名和身份验证的冲突目标,试图将用户与共同的愿望相匹配。最近的工作建立在过去的尝试之上,提出了带有额外安全目标的私人和增强隐私的配对解决方案。然而,这些协议在TPP的背景下是不够的,主要原因是缺乏公平性,无法确保安全和隐私。我们详细描述了TPP,与之前的工作进行了比较,并提出了一个公平和隐私增强的配对协议,支持与不受信任的媒人进行身份链接的愿望。实际上,我们的技术可以防止数据泄露带来的潜在损害,比如最近阿什利·麦迪逊(Ashley Madison)被黑客入侵,据称该事件导致了勒索、毁了职业、间谍活动,甚至自杀。我们给出了我们的解决方案的伪代码示例,以及它的安全性和初步性能评估。
{"title":"The Prom Problem: Fair and privacy-enhanced matchmaking with identity linked wishes","authors":"Dwight Home, S. Nair","doi":"10.1109/CCST.2016.7815691","DOIUrl":"https://doi.org/10.1109/CCST.2016.7815691","url":null,"abstract":"In this paper we present the Prom Problem (TPP) which exemplifies a special class of matchmaking challenges. We introduce the notion of identity linked wishes - wishes that involve specific identities and are valid if and only if all involved parties have that wish. A number of protocols over the years have highlighted the conflicting goals of anonymity and authentication in attempting to match users with common wishes. More recent works have built upon past attempts proposing solutions for private and privacy-enhanced matchmaking with additional security goals. Yet those protocols are insufficient in the context of TPP due primarily to the lack of fairness and inability to ensure security and privacy. We describe TPP in detail, compare with prior work, and propose a fair and privacy-enhanced matchmaking protocol supporting identity linked wishes with an untrusted matchmaker. In practical terms, our technology can prevent much of the potential damage from data breaches similar to the recent Ashley Madison hack which has allegedly resulted in blackmail, ruined careers, espionage, and even suicide. We give a pseudo-code example of our solution along with its security and preliminary performance evaluation.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"11 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90427316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Mission success: Assured communications and agile organizations 任务成功:确保沟通和敏捷组织
Pub Date : 2016-10-01 DOI: 10.1109/CCST.2016.7815687
M. Vassiliou, D. Alberts, S. Shah
Success in complex missions, whether in the civilian, military, or mixed sectors, depends on agile organizations adapting their enterprise approaches to suit the purposes and circumstances at hand, and being able and willing to communicate necessary information. Case studies of complex endeavors in theaters including warfare, terrorism, and response to natural disasters have shown that communication failures are a very significant cause of adverse consequences, often including overall mission failure. Communication failures can be behavioral ones, exacerbated by inappropriate organizational choices. They can also arise from shortfalls in system design and technology. Enterprise approaches that are decentralized and network-enabled to varying degrees have differing propensities to communicate necessary information in diverse circumstances. They also have a complex and varying interplay with the enterprise's information and communications technology, and varying resilience to communications disruption. While more agile organizations can make up for communications shortfalls to an extent, there is no substituted for assured communications capabilities. In this connection, the ability to communicate relatively small amounts of information reliably can be much more important than the ability to transmit large multimedia files with high throughput. Important facets of assured communications systems include agility with respect to channel and spectrum, protection from attack and tampering, resilience in the face of disruptions, and interoperability. In some cases the goals can be achieved with appropriate policy, and in others with new technology development.
无论是在民用、军事还是混合领域,复杂任务的成功取决于敏捷组织调整其企业方法以适应手头的目的和环境,并且能够并且愿意沟通必要的信息。包括战争、恐怖主义和对自然灾害的响应在内的战区复杂努力的案例研究表明,通信故障是造成不利后果的一个非常重要的原因,通常包括整体任务失败。沟通失败可能是行为上的,不恰当的组织选择会加剧沟通失败。它们也可能源于系统设计和技术上的不足。分散的和在不同程度上支持网络的企业方法在不同情况下具有不同的通信必要信息的倾向。它们还与企业的信息和通信技术具有复杂和不同的相互作用,并且对通信中断具有不同的弹性。虽然更敏捷的组织可以在一定程度上弥补通信不足,但没有什么可以替代有保证的通信能力。在这方面,可靠地通信相对少量信息的能力可能比以高吞吐量传输大型多媒体文件的能力重要得多。可靠通信系统的重要方面包括通道和频谱方面的敏捷性、防止攻击和篡改、面对中断时的弹性以及互操作性。在某些情况下,这些目标可以通过适当的政策来实现,而在其他情况下,则可以通过开发新技术来实现。
{"title":"Mission success: Assured communications and agile organizations","authors":"M. Vassiliou, D. Alberts, S. Shah","doi":"10.1109/CCST.2016.7815687","DOIUrl":"https://doi.org/10.1109/CCST.2016.7815687","url":null,"abstract":"Success in complex missions, whether in the civilian, military, or mixed sectors, depends on agile organizations adapting their enterprise approaches to suit the purposes and circumstances at hand, and being able and willing to communicate necessary information. Case studies of complex endeavors in theaters including warfare, terrorism, and response to natural disasters have shown that communication failures are a very significant cause of adverse consequences, often including overall mission failure. Communication failures can be behavioral ones, exacerbated by inappropriate organizational choices. They can also arise from shortfalls in system design and technology. Enterprise approaches that are decentralized and network-enabled to varying degrees have differing propensities to communicate necessary information in diverse circumstances. They also have a complex and varying interplay with the enterprise's information and communications technology, and varying resilience to communications disruption. While more agile organizations can make up for communications shortfalls to an extent, there is no substituted for assured communications capabilities. In this connection, the ability to communicate relatively small amounts of information reliably can be much more important than the ability to transmit large multimedia files with high throughput. Important facets of assured communications systems include agility with respect to channel and spectrum, protection from attack and tampering, resilience in the face of disruptions, and interoperability. In some cases the goals can be achieved with appropriate policy, and in others with new technology development.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"65 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88681129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cryptographic library performance comparison for instant messaging system centralized data 用于即时消息系统集中数据的加密库性能比较
Pub Date : 2016-10-01 DOI: 10.1109/CCST.2016.7815704
R. C. Logreira, Z. J. Florez, Mario Muñoz
The explosion in mobile communication use in our lives has led to a new method for information exchange between people. Therefore, there are now plenty of instant messaging applications, which have a single purpose that is done through different methods. Thus, methods and information exchange protocols play an important role in reducing processing times, low battery consumption and low bandwidth consumption. This article shows the comparison in time performance of an instant messager server through two open source cryptographic library implementations, using two asymmetric cryptographic processes in a centralized messaging system in order to seek confidentiality, integrity and authenticity of the messages. Cryptographic schemes used are Elliptic Curve Diffie-Hellman (ECDH) and Elliptic Curve Digital Signature Algorithm (ECDSA). In addition, it determines which library is more efficient to implement in that server.
移动通信在我们生活中的爆炸式增长为人与人之间的信息交换带来了一种新的方式。因此,现在有大量的即时消息应用程序,它们通过不同的方法实现单一的目的。因此,方法和信息交换协议在减少处理时间、低电池消耗和低带宽消耗方面发挥着重要作用。本文通过两个开源加密库实现来比较即时消息服务器的时间性能,在集中式消息传递系统中使用两个非对称加密过程,以寻求消息的机密性、完整性和真实性。使用的加密方案有椭圆曲线Diffie-Hellman (ECDH)和椭圆曲线数字签名算法ECDSA。此外,它还决定在该服务器中实现哪个库更有效。
{"title":"Cryptographic library performance comparison for instant messaging system centralized data","authors":"R. C. Logreira, Z. J. Florez, Mario Muñoz","doi":"10.1109/CCST.2016.7815704","DOIUrl":"https://doi.org/10.1109/CCST.2016.7815704","url":null,"abstract":"The explosion in mobile communication use in our lives has led to a new method for information exchange between people. Therefore, there are now plenty of instant messaging applications, which have a single purpose that is done through different methods. Thus, methods and information exchange protocols play an important role in reducing processing times, low battery consumption and low bandwidth consumption. This article shows the comparison in time performance of an instant messager server through two open source cryptographic library implementations, using two asymmetric cryptographic processes in a centralized messaging system in order to seek confidentiality, integrity and authenticity of the messages. Cryptographic schemes used are Elliptic Curve Diffie-Hellman (ECDH) and Elliptic Curve Digital Signature Algorithm (ECDSA). In addition, it determines which library is more efficient to implement in that server.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"144 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85386271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A comparative analysis on the performance of static handwritten verification systems on realistic scenarios 静态手写验证系统在现实场景下的性能对比分析
Pub Date : 2016-10-01 DOI: 10.1109/CCST.2016.7815679
Rodrigo Ros-Gomez, Helga C. Quiros-Sandoval, Ramón Blanco-Gonzalo, R. Sánchez-Reillo
An analysis on realistic conditions for static handwritten signature verification systems is presented. Evaluation conditions are studied so to approximate as accurately as possible the conditions of a real-world operational scenario. Also, the problem of modeling realistic attacks by using databases containing forgeries is considered in the analysis. To do so, a database collected with different levels of knowledge and training is used. Performance evaluation results with these restrictions are given over several databases. Results show the effect of the amount of training and the information available to the forger on the attack resistance of some algorithms.
对静态手写签名验证系统的现实条件进行了分析。对评估条件进行了研究,以便尽可能准确地近似真实操作场景的条件。此外,分析中还考虑了使用包含伪造文件的数据库对真实攻击进行建模的问题。为此,使用了一个收集了不同水平的知识和培训的数据库。给出了基于这些限制的多个数据库的性能评估结果。结果显示了训练量和伪造者可获得的信息对某些算法的抗攻击能力的影响。
{"title":"A comparative analysis on the performance of static handwritten verification systems on realistic scenarios","authors":"Rodrigo Ros-Gomez, Helga C. Quiros-Sandoval, Ramón Blanco-Gonzalo, R. Sánchez-Reillo","doi":"10.1109/CCST.2016.7815679","DOIUrl":"https://doi.org/10.1109/CCST.2016.7815679","url":null,"abstract":"An analysis on realistic conditions for static handwritten signature verification systems is presented. Evaluation conditions are studied so to approximate as accurately as possible the conditions of a real-world operational scenario. Also, the problem of modeling realistic attacks by using databases containing forgeries is considered in the analysis. To do so, a database collected with different levels of knowledge and training is used. Performance evaluation results with these restrictions are given over several databases. Results show the effect of the amount of training and the information available to the forger on the attack resistance of some algorithms.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"61 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84677197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Challenges to securing the Internet of Things 物联网安全面临的挑战
Pub Date : 2016-10-01 DOI: 10.1109/CCST.2016.7815675
W. Stout, V. Urias
Great advances in technology have paved the way for the computerization and interconnectedness of the world around us. The Internet of Things (IoT) describes a network comprised of physical objects or “things” embedded with electronics, software, sensors and connectivity to achieve greater value and service by exchanging data with manufacturers, users, and/or other connected devices. However, it is often the case that some of these devices are constrained by limited processing power, memory, and power consumption. These limitations may enable adverse effects as the IoT becomes pervasive, reaching into infrastructure, vehicles, and homes. As history has shown, the architects of the Internet were focused primarily on the efficiency and scaling aspects of data transfer protocols; at the dawn of the Internet, network and computer security were vacant research areas. The current trend shows the IoT market growing at an accelerated rate - will security again become an afterthought? The goal of this paper is to provide to not only a better understanding of the various IoT domains, but to survey the shortcomings and challenges to securing IoT devices and their interactions with cloud and enterprise applications.
科技的巨大进步为我们周围世界的计算机化和互联化铺平了道路。物联网(IoT)描述了一个由嵌入电子、软件、传感器和连接的物理对象或“事物”组成的网络,通过与制造商、用户和/或其他连接设备交换数据来实现更大的价值和服务。然而,通常情况下,这些设备中的一些受到有限的处理能力、内存和功耗的限制。随着物联网的普及,这些限制可能会产生不利影响,渗透到基础设施、车辆和家庭中。正如历史所示,互联网的架构师主要关注数据传输协议的效率和可扩展性方面;在互联网诞生之初,网络和计算机安全是空白的研究领域。目前的趋势显示物联网市场正在加速增长——安全是否会再次成为事后的考虑?本文的目标不仅是提供对各种物联网领域的更好理解,而且还调查了保护物联网设备及其与云和企业应用程序交互的缺点和挑战。
{"title":"Challenges to securing the Internet of Things","authors":"W. Stout, V. Urias","doi":"10.1109/CCST.2016.7815675","DOIUrl":"https://doi.org/10.1109/CCST.2016.7815675","url":null,"abstract":"Great advances in technology have paved the way for the computerization and interconnectedness of the world around us. The Internet of Things (IoT) describes a network comprised of physical objects or “things” embedded with electronics, software, sensors and connectivity to achieve greater value and service by exchanging data with manufacturers, users, and/or other connected devices. However, it is often the case that some of these devices are constrained by limited processing power, memory, and power consumption. These limitations may enable adverse effects as the IoT becomes pervasive, reaching into infrastructure, vehicles, and homes. As history has shown, the architects of the Internet were focused primarily on the efficiency and scaling aspects of data transfer protocols; at the dawn of the Internet, network and computer security were vacant research areas. The current trend shows the IoT market growing at an accelerated rate - will security again become an afterthought? The goal of this paper is to provide to not only a better understanding of the various IoT domains, but to survey the shortcomings and challenges to securing IoT devices and their interactions with cloud and enterprise applications.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"79 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75155393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Detection of UAV hijacking and malfunctions via variations in flight data statistics 通过飞行数据统计的变化检测无人机劫持和故障
Pub Date : 2016-10-01 DOI: 10.1109/CCST.2016.7815713
Jason McNeely, M. Hatfield, Abir Hasan, Nusrat Jahan
Detection of potential hijackings of Unmanned Aerial Vehicles (UAVs) is an important capability to have for the safety of the future airspace and prevention of loss of life and property. In this paper, we propose using basic statistical measures as a fingerprint to flight patterns that can be checked against previous flights. We generated baseline flights and then simulated hijacking scenarios to determine the extent of the feasibility of this method. Our results indicated that all of the direct hijacking scenarios were detected, but flights with control instability caused by malicious acts were not detected.
探测潜在的无人机劫持是未来空域安全和防止生命财产损失的重要能力。在本文中,我们建议使用基本的统计措施作为飞行模式的指纹,可以对照以前的航班进行检查。我们生成基线飞行,然后模拟劫持场景,以确定该方法的可行性程度。我们的研究结果表明,所有的直接劫持场景都被检测到,但由于恶意行为导致的控制不稳定的航班没有被检测到。
{"title":"Detection of UAV hijacking and malfunctions via variations in flight data statistics","authors":"Jason McNeely, M. Hatfield, Abir Hasan, Nusrat Jahan","doi":"10.1109/CCST.2016.7815713","DOIUrl":"https://doi.org/10.1109/CCST.2016.7815713","url":null,"abstract":"Detection of potential hijackings of Unmanned Aerial Vehicles (UAVs) is an important capability to have for the safety of the future airspace and prevention of loss of life and property. In this paper, we propose using basic statistical measures as a fingerprint to flight patterns that can be checked against previous flights. We generated baseline flights and then simulated hijacking scenarios to determine the extent of the feasibility of this method. Our results indicated that all of the direct hijacking scenarios were detected, but flights with control instability caused by malicious acts were not detected.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"38 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76401034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Automated comparison of X-ray images for cargo scanning 货物扫描的x射线图像自动比较
Pub Date : 2016-10-01 DOI: 10.1109/CCST.2016.7815714
Wicher Visser, A. Schwaninger, D. Hardmeier, A. Flisch, M. Costin, C. Vienne, F. Sukowski, U. Hassler, I. Dorion, Abraham Marciano, G. Koomen, M. Slegt, Andrea Canonica
Customs administrations are responsible for the enforcement of fiscal integrity and security of movements of goods across land and sea borders. In order to verify whether the transported goods match the transport declaration, X-ray imaging of containers is used at many customs site worldwide. The main objective of the research and development project “Automated Comparison of X-ray Images for Cargo Scanning (ACXIS)”, which is funded by the European 7th Framework Program, is to improve the efficiency and effectiveness of the inspection procedures of cargo at customs using X-ray technology. The current inspection procedures are reviewed to identify risks, catalogue illegal cargo, and prioritize detection scenarios. Based on these results, we propose an integrated solution that provides automation, information exchange between customs administrations, and computer-based training modules for customs officers. Automated target recognition (ATR) functions analyze the X-ray image after a scan is made to detect certain types of goods such as cigarettes, weapons and drugs in the freight or container. Other helpful information can also be provided, such as the load homogeneity, total or partial weight, or the number of similar items. The ATR functions are provided as an option to the user. The X-ray image is transformed into a manufacturer-independent format through geometrical and spectral corrections and stored into a database along with the user feedback and other related data. This information can be exchanged with similar systems at other sites, thus facilitating information exchange between customs administrations. The database is seeded with over 30'000 examples of legitimate and illegal goods. These examples are used by the ATR functions through machine learning techniques, which are further strengthened by the information exchange. In order to improve X-ray image interpretation competency of human operators (customs officers), a computer-based training software is developed that simulates these new inspection procedures. A study is carried out to validate the effectiveness and efficiency of the computer-based training as well as the implemented procedures. Officers from the Dutch and Swiss Customs administrations partake in the study, covering both land and sea borders.
海关管理部门负责执行财政诚信和货物跨境和海上流动的安全。为了核实运输货物是否与运输申报相符,全球许多海关都使用集装箱x射线成像技术。由欧洲第7框架计划资助的“货物扫描x射线图像自动比较”研究和发展项目的主要目的是提高海关使用x射线技术检查货物程序的效率和效果。审查现行的检查程序,以识别风险,对非法货物进行分类,并优先考虑检测方案。根据这些结果,我们提出了一个综合解决方案,提供自动化、海关管理部门之间的信息交换和海关人员的计算机培训模块。自动目标识别(ATR)功能分析扫描后的x射线图像,以检测货物或集装箱中的香烟、武器、毒品等特定类型的货物。还可以提供其他有用的信息,例如负载均匀性、总重量或部分重量或类似项目的数量。ATR功能作为选项提供给用户。通过几何和光谱校正,将x射线图像转换为与制造商无关的格式,并与用户反馈和其他相关数据一起存储到数据库中。这些资料可与其他地点的类似系统交换,从而促进海关当局之间的资料交换。该数据库包含超过3万个合法和非法商品的例子。这些例子通过机器学习技术被ATR函数使用,并通过信息交换进一步加强。为了提高人工操作员(海关人员)解读x光图像的能力,海关开发了一套模拟这些新检查程序的电脑培训软件。进行了一项研究,以验证以计算机为基础的培训的有效性和效率以及所实施的程序。来自荷兰和瑞士海关的官员参与了这项研究,涵盖了陆地和海上边界。
{"title":"Automated comparison of X-ray images for cargo scanning","authors":"Wicher Visser, A. Schwaninger, D. Hardmeier, A. Flisch, M. Costin, C. Vienne, F. Sukowski, U. Hassler, I. Dorion, Abraham Marciano, G. Koomen, M. Slegt, Andrea Canonica","doi":"10.1109/CCST.2016.7815714","DOIUrl":"https://doi.org/10.1109/CCST.2016.7815714","url":null,"abstract":"Customs administrations are responsible for the enforcement of fiscal integrity and security of movements of goods across land and sea borders. In order to verify whether the transported goods match the transport declaration, X-ray imaging of containers is used at many customs site worldwide. The main objective of the research and development project “Automated Comparison of X-ray Images for Cargo Scanning (ACXIS)”, which is funded by the European 7th Framework Program, is to improve the efficiency and effectiveness of the inspection procedures of cargo at customs using X-ray technology. The current inspection procedures are reviewed to identify risks, catalogue illegal cargo, and prioritize detection scenarios. Based on these results, we propose an integrated solution that provides automation, information exchange between customs administrations, and computer-based training modules for customs officers. Automated target recognition (ATR) functions analyze the X-ray image after a scan is made to detect certain types of goods such as cigarettes, weapons and drugs in the freight or container. Other helpful information can also be provided, such as the load homogeneity, total or partial weight, or the number of similar items. The ATR functions are provided as an option to the user. The X-ray image is transformed into a manufacturer-independent format through geometrical and spectral corrections and stored into a database along with the user feedback and other related data. This information can be exchanged with similar systems at other sites, thus facilitating information exchange between customs administrations. The database is seeded with over 30'000 examples of legitimate and illegal goods. These examples are used by the ATR functions through machine learning techniques, which are further strengthened by the information exchange. In order to improve X-ray image interpretation competency of human operators (customs officers), a computer-based training software is developed that simulates these new inspection procedures. A study is carried out to validate the effectiveness and efficiency of the computer-based training as well as the implemented procedures. Officers from the Dutch and Swiss Customs administrations partake in the study, covering both land and sea borders.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"5 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90191688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
期刊
2016 IEEE International Carnahan Conference on Security Technology (ICCST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1